期刊文献+

基于边界检测的移动智能终端隐私泄露检测方法 被引量:3

Privacy Leakage Detection for Mobile Intelligent Terminal based on Boundary Detection
下载PDF
导出
摘要 当下移动互联网迅速发展,移动智能终端安全尤其是用户隐私信息泄露问题备受关注。文章提出了一种基于边界检测的移动智能终端隐私泄露检测方法,该方法通过构建无线网桥,获取移动终端网络边界的数据包,进行解包分析,能够有效地检测出移动智能终端在访问互联网时是否存在隐私信息泄露问题。测试表明,该方法适用于iOS、Android等操作系统,支持对TCP报文尤其是HTTP协议的解析,能够实时地进行检测。 With the rapid development of mobile Internet, much attention has been paid to the security of terminal, especially of the user privacy leakage. This paper proposes a method of privacy leakage detection for the mobile intelligent terminal, which is based on the boundary detection. Through constructing a wireless bridge, capturing packets from network boundary of the mobile terminal and parsing the communication data, this method can effectively detect whether the mobile terminal has the problem of privacy leakage when it accesses to the Intemet. The test shows that the method is suitable for iOS, Android and other operating systems, in support of TCP packets, especially HTTP protocol analysis, and it can detect in real time.
出处 《信息网络安全》 2014年第1期21-24,共4页 Netinfo Security
基金 国家发改委信息安全专项
关键词 移动智能终端 边界检测 隐私泄露 报文解析 数据匹配 mobile intelligent terminal boundary detection privacy leakage packet parsing data matching
  • 相关文献

参考文献10

二级参考文献82

  • 1盖凌云,黄树来.分布式拒绝服务攻击及防御机制研究[J].通信技术,2007,40(6):40-41. 被引量:6
  • 2杨武,方滨兴,云晓春,张宏莉.入侵检测系统中高效模式匹配算法的研究[J].计算机工程,2004,30(13):92-94. 被引量:23
  • 3胡晓元,史浩山.WinPcap包截获系统的分析及其应用[J].计算机工程,2005,31(2):96-98. 被引量:39
  • 4盛志伟,刘仕筠,李群.以太网数据包捕获与转发技术[J].微计算机信息,2006,22(12S):279-282. 被引量:14
  • 5Anti-Phishing Working Group [EB/OL]. http://www.antiphishing. org, 2008-01/2011-12-15.
  • 6PhishTank [EB/OL]. http://www.phishtank.com, 2011-04/2011-12-15.
  • 7Engin Kirda, Christopher Kruegel. Protecting Users against Phishing Attacks[J]. The Computer Journal, 2006, 49(05):554-561.
  • 8Ian Fette, Norman Sadeh, Anthony Tomasic. Learning to Detect Phishing Emails[C]. In Proc. of the WWW 2007, Alberta, Canada, May 8-12, 2007: 649-656.
  • 9Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera. Collaborative Detection of Fast Flux Phishing Domains[J]. Journal of Networks, 2009, 4(01):75-84.
  • 10D. Kevin McGrath, Minaxi Gupta. Behind Phishing: An Examination of Phisher Modi Operandi[C]. In Proc. of the 1st Usenix Workshop on Large- Scale Exploits and Emergent Threats, California USA, April 15 2008:1-8.

共引文献183

同被引文献61

  • 1钟延辉,傅彦,陈安龙,关娜.基于抽样的垃圾短信过滤方法[J].计算机应用研究,2009,26(3):933-935. 被引量:15
  • 2邓维维,彭宏.移动环境下的垃圾短信过滤系统的研究[J].计算机应用,2007,27(1):221-224. 被引量:14
  • 3康治平,向宏,傅鹂.基于API HOOK技术的特洛伊木马攻防研究[J].信息安全与通信保密,2007,29(2):145-148. 被引量:4
  • 4钱升华,武优西,柴欣,陈冀川.文本分类综述及手机垃圾短信过滤方法的研究[J].河北工业大学学报,2007,36(1):35-41. 被引量:5
  • 5JR/0071-2012金融行业信息系统信息安全等级保护实施指引[S].北京:金融标准化技术委员会,2012.
  • 6COBIT5,Control Objectives for Information and related TechnologyFifth Edition[S].信息系统审计和控制联合会(ISACA ), 2013.
  • 7ISO/IEC27001:2013 Information technology-Security techniques-Information security management systems一Requirements[S].国际标准化组织(tSO),2013.
  • 8LEWIS D D. Naive (Bayes) at forty: The Independence Assumption in information Retrieval[C]//In proceedings of 10th European Conference on machine Learning, New York, 1998.
  • 9JOACHIMS T. Text categorization with support vector machines: Learning With many Relevant Feature[C]//In proceedings of 10th European Conference on machine Learning, New York, 1998.
  • 10WIENER E. A neural network approach to topic spotting[C]//In Proceedings for the 4th Annual Symposium on Document Analysis and Information Retrival (SDAIR), Las Vegas, 1995.

引证文献3

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部